CyberTechls
  • Home
  • Technology
  • AI News
  • Resources

Archives

  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • March 2024

Categories

  • Events
  • Resources
  • Technology
  • Uncategorized
  • Home
  • Technology
  • AI News
  • Resources
Subscribe
CyberTechls CyberTechls
CyberTechls CyberTechls
  • Home
  • Technology
  • AI News
  • Resources
  • Technology

The Power of Measurement in Cybersecurity: Reducing Uncertainty, Not Chasing Perfection

  • March 1, 2025
  • August Udoh
Total
0
Shares
0
0
0

In cybersecurity, as in many fields, decision-making often hinges on data—or more precisely, on the reduction of uncertainty through measurement. Yet, a common misconception persists: that measurement must be perfect, exhaustive, or universally accepted to be useful. This is a fallacy that leads organizations to avoid measuring at all, leaving them exposed to preventable risks.

A more practical approach, as I have long argued, is to view measurement as observations that quantitatively reduce uncertainty. Every metric, no matter how seemingly imperfect, helps refine our understanding and improve our ability to act.

Why Measurement Matters in Cybersecurity

Consider an organization deciding whether to invest in a new endpoint detection and response (EDR) solution. Many cybersecurity teams hesitate because they believe they need an exact calculation of breach probability before justifying the cost. But in reality, even a rough estimate—derived from historical breach data, attack surface analysis, or industry benchmarks—can significantly reduce uncertainty about the potential impact of an investment. The goal is not to achieve omniscience but to make better decisions with the information available.

This principle also applies to risk assessments. Many businesses struggle with qualitative risk matrices (e.g., “High,” “Medium,” “Low” ratings) that offer the illusion of precision without actually reducing uncertainty. A quantitative approach, even if built from incomplete data, often yields more actionable insights. For example, shifting from “High risk” to “There is a 15% chance of a breach costing $2 million this year” allows executives to compare cybersecurity risks against other business risks in financial terms.

Tackling the “We Can’t Measure That” Fallacy

Cybersecurity professionals often argue that certain risks are unmeasurable. Insider threats, supply chain vulnerabilities, and nation-state attacks are cited as challenges because they involve unpredictable human behavior. However, the absence of perfect data does not mean the absence of useful data.

By leveraging Bayesian inference, Monte Carlo simulations, or even structured expert judgment, organizations can refine their probability estimates over time. If an initial estimate says, “We believe there’s a 30% chance of an insider threat causing major damage within the next three years,” further observations—such as the frequency of access violations or results from employee security training—can adjust that probability up or down.

Measurement as a Continuous Process

Cybersecurity threats evolve, and so should measurement strategies. Security teams must embrace measurement as an iterative process rather than a one-time event. Regularly updating risk assessments based on new observations—failed phishing attempts, penetration testing results, or emerging threat intelligence—ensures that decisions remain grounded in the best available data.

Final Thought: Measuring for Action, Not Perfection

In cybersecurity, as in any field, decisions must be made under uncertainty. The key is to reduce that uncertainty enough to act rationally, rather than waiting for absolute certainty that will never come. The best security teams recognize that any measurement—even an imperfect one—is better than a gut feeling disguised as strategy.

The question isn’t whether we can measure cybersecurity risks, but whether we can afford not to.

Total
0
Shares
Share 0
Tweet 0
Pin it 0
August Udoh

Previous Article
  • Resources
  • Uncategorized

Best DNS Server Security Practices to Safeguard Your Network

  • March 1, 2025
  • Anthony Agbor
View Post
Next Article
  • Events

Cloud & Cyber Security Expo

  • March 2, 2025
  • Admin
View Post
You May Also Like
View Post
  • Technology

The things we know and the things we don’t know we don’t know.

  • August Udoh
  • March 20, 2025
View Post
  • Technology

Parental Oversight Online: Not Helicoptering.

  • August Udoh
  • March 16, 2025
View Post
  • Technology

Lattes or Firewalls? Your Choice.

  • August Udoh
  • March 15, 2025
View Post
  • Technology

Why North Korea Is Nearly Immune to Cyber War

  • August Udoh
  • March 12, 2025
View Post
  • Technology

When the Battlefield Extends Beyond the Keyboard

  • August Udoh
  • March 11, 2025
View Post
  • Technology

To Save Everything, Click Here: Why Not Everything Can Be Solved

  • August Udoh
  • March 9, 2025
View Post
  • Technology

The Accidental Naming of UNIX: A Security Researcher’s Joke That Stuck

  • August Udoh
  • March 8, 2025
View Post
  • Technology

The Unseen Innovators: Why Security Needs to Assume the Unexpected

  • August Udoh
  • March 7, 2025

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • The things we know and the things we don’t know we don’t know.
  • Parental Oversight Online: Not Helicoptering.
  • Lattes or Firewalls? Your Choice.
  • Welcome to the Internet of Terrifying Things
  • Why North Korea Is Nearly Immune to Cyber War

Recent Comments

No comments to show.
Featured Posts
  • 1
    The things we know and the things we don’t know we don’t know.
    • March 20, 2025
  • 2
    Parental Oversight Online: Not Helicoptering.
    • March 16, 2025
  • 3
    Lattes or Firewalls? Your Choice.
    • March 15, 2025
  • 4
    Welcome to the Internet of Terrifying Things
    • March 13, 2025
  • 5
    Why North Korea Is Nearly Immune to Cyber War
    • March 12, 2025
Recent Posts
  • When the Battlefield Extends Beyond the Keyboard
    • March 11, 2025
  • To Save Everything, Click Here: Why Not Everything Can Be Solved
    • March 9, 2025
  • The Accidental Naming of UNIX: A Security Researcher’s Joke That Stuck
    • March 8, 2025
Categories
  • Events (3)
  • Resources (1)
  • Technology (26)
  • Uncategorized (2)
CyberTechls
  • Home
  • Technology
  • AI News
  • Resources
Latest Cybersecurity News & Update

Input your search keywords and press Enter.